Images can communicate a service, brand or product. Moreover, images provide depth and context to a description or story and give a much more intense experience than writing alone. Image retrieval is the highest searc...
详细信息
In this paper, General Purpose Graphical Processing Unit (GPGPU) based concurrent implementation of handwritten digit classifier is presented. Different styles of handwriting make it difficult to recognize a pattern b...
详细信息
ISBN:
(纸本)9781509055869
In this paper, General Purpose Graphical Processing Unit (GPGPU) based concurrent implementation of handwritten digit classifier is presented. Different styles of handwriting make it difficult to recognize a pattern but using neural network, it is not a difficult task to perform. Different softwares like torch and MATLAB provide the support of multiple training algorithms to train a network. By choosing an appropriate training algorithm for a specific application, speed of training can be increased. Furthermore, using computational power of GPUs, training and classification speed of neural network can be significantly improved. In this work, Modified National Institute of Standards and Technology (MNIST) database of handwritten digits is used to train the network. Accuracy and training time of digit classifier is evaluated for different algorithms and then concurrent training is performed by exploiting power of GPU. Trained parameters are imported and used for the concurrent classification with Compute Unified Device Architecture (CUDA) computing language which can be useful in numerous practical applications. Finally, the results of sequential and concurrent operations of training and classification are compared.
In patternrecognition applications with high number of input features and insufficient number of samples, the curse of dimensionality can be overcome by extracting features from smaller feature subsets. the domain kn...
详细信息
At the present IC technologies, the accurately extraction of the interconnects parasitic parameters become more important. But for the time consuming, that computingthe parameters of interconnects with field solver d...
详细信息
In this paper, we apply ensemble methods from statistical physics to analyse fMRI brain networks for Alzheimer's patients. By mapping the nodes in a network to virtual particles in a thermal system, the microcanon...
详细信息
ISBN:
(纸本)9781728188089
In this paper, we apply ensemble methods from statistical physics to analyse fMRI brain networks for Alzheimer's patients. By mapping the nodes in a network to virtual particles in a thermal system, the microcanonical ensemble and the canonical ensemble are analogous to two different fMRI network representations. these representations are obtained by selecting a threshold on the BOLD time series correlations between nodes in different ways. the microcanonical ensemble corresponds to a set of networks with a fixed fraction of edges, while the canonical ensemble corresponds to the set networks with edges obtained with a fixed value of the threshold. In the former case, there is zero variance in the number of edges in each network, while in the latter case the set of networks have a variance in the number of edges. Ensemble methods describe the macroscopic properties of a network by considering the underlying microscopic characterisations which are in turn closely related to the degree configuration and network entropy. Our treatment allows us to specify new partition functions for fMRI brain networks, and to explore a phase transition in the degree distribution. the resulting method turns out to be an effective tool to identify the most salient anatomical brain regions in Alzheimer's disease and provides a tool to distinguish groups of patients in different stages of the disease.
Approximate nearest neighbor (ANN) search has been wellstudied and weightily applied in the field of large scale multimedia search. In recent years, Product Quantization (PQ) based methods have achieved greate success...
详细信息
the proceedings contain 6 papers. the special focus in this conference is on Security Proofs for Embedded Systems. the topics include: Locality Based Cache Side-channel Attack Detection∗;XMSS-based Chain of Trust;towa...
the proceedings contain 6 papers. the special focus in this conference is on Security Proofs for Embedded Systems. the topics include: Locality Based Cache Side-channel Attack Detection∗;XMSS-based Chain of Trust;towards Finding Best Linear Codes for Side-Channel Protections.
Axonal conduction delays should not be ignored in simulations of spiking neural networks. Here it is shown that by using axonal conduction delays, neurons can display sensitivity to a specific spatiotemporal spike pat...
详细信息
ISBN:
(纸本)9783642202810
Axonal conduction delays should not be ignored in simulations of spiking neural networks. Here it is shown that by using axonal conduction delays, neurons can display sensitivity to a specific spatiotemporal spike pattern. By using delays that complement the firing times in a pattern, spikes can arrive simultaneously at an output neuron, giving it a high chance of firing in response to that pattern. An unsupervised learning mechanism called spike-timing-dependent plasticity then increases the weights for connections used in the pattern, and decreases the others. this allows for an attunement of output neurons to specific activity patterns, based on temporal aspects of axonal conductivity.
In this paper, we propose a logistics international Inland Port resource allocation method based on intelligent edge scheduling, and we do a reasonable pre-allocation of logistics resources by building an edge network...
详细信息
Fault tolerance in mobile cloud computing is highly important aspect, even more than a conventional cloud computing because of the mobile nature of devices i.e. mobility. Mobile cloud computing (MCC) combines cloud co...
详细信息
ISBN:
(纸本)9781467359979;9781467359993
Fault tolerance in mobile cloud computing is highly important aspect, even more than a conventional cloud computing because of the mobile nature of devices i.e. mobility. Mobile cloud computing (MCC) combines cloud computing and mobile devices to provide the benefits for mobile users, network operators and cloud providers also. Mobile devices have various problems like enter and leave the connection unpredictably, Limitation of battery power, frequent location changes, network signal loss, hardware failures and other common factors. Mobile devices appear and disappear in the network unpredictably. the proposed technique reduces the faults of mobile devices by using the past pattern of states and making the decision for predicting the future states of mobile devices. In this paper we have proposed a fault monitoring technique which is based on Hidden Markov Model (HMM) and Baum-Welch algorithm for analyzing and predicting the future resource state.
暂无评论